z-logo
open-access-imgOpen Access
SECURITY IMPROVEMENT AND TRUST ENHANCEMENT IN CLOUD-BASED SERVICES
Author(s) -
Shalabh Negi,
R. Jayanthi
Publication year - 2017
Publication title -
asian journal of pharmaceutical and clinical research
Language(s) - English
Resource type - Journals
eISSN - 2455-3891
pISSN - 0974-2441
DOI - 10.22159/ajpcr.2017.v10s1.20525
Subject(s) - cloud computing , computer science , computer security , key (lock) , block (permutation group theory) , cloud service provider , service (business) , set (abstract data type) , database , cloud computing security , computer network , operating system , geometry , mathematics , economy , programming language , economics
Management of trust is one of the most challenging parts in cloud computing. Cloud service’s features such as distributed, dynamic and nontransparentintroduces several challenges for availability, privacy, and security. A method is proposed to have trust as a service between cloud serviceprovider and customer by creating a cloud armor. This proposed methodology is used to make cloud server end and customer end system secure ofany intrusion to their privacy. In this methodology, we will have a user usage pattern log as ever user has its own unique way of using his/her system;hence, in case if any odd user pattern is being encountered it will automatically block the system and simultaneously shoots a message as well as a callto the user notifying him/her about this unauthorized access. This log is set a various small pattern log, for example, keylog, preferable website visited,and time of accessing the system. Further, we have secured these logs using Rivest-Shamir-Adleman algorithm with very large key size.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here